<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Physical</title>
    <description>
      <![CDATA[Information and products for enterprise physical security executives. ]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2787</link>
    <language>en-us</language>
    <item>
      <title>World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
A snapshot of the state of the cloud in cybersecurity and physical security.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102204</guid>
      <pubDate>Fri, 03 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102204-world-cloud-security-day-breaking-down-the-state-of-the-cloud-cybersecurity-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Cloud-security-by-Growtika.webp?t=1775232056" type="image/png" length="255866"/>
    </item>
    <item>
      <title>8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes</title>
      <author></author>
      <description>
        <![CDATA[<p>Most&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI chatbots are likely to assist a user in planning a violent attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102201</guid>
      <pubDate>Thu, 02 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102201-8-in-10-ai-chatbots-likely-to-help-plan-attacks-hate-crimes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Chatbot-prompt-screen-by-Zulfugar-Karimov.webp?t=1775062464" type="image/png" length="365644"/>
    </item>
    <item>
      <title>Beyond the Certificate: Why Real Expertise in Investigative Interviewing Comes from Practice</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Training programs provide essential baseline knowledge, b<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ut training alone does not make someone proficient.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102200</guid>
      <pubDate>Thu, 02 Apr 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102200-beyond-the-certificate-why-real-expertise-in-investigative-interviewing-comes-from-practice</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Interview-by-Vitaly-Gariev.webp?t=1775057353" type="image/png" length="347211"/>
    </item>
    <item>
      <title>The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats</title>
      <description>
        <![CDATA[<p>The corporate world has witnessed a dramatic shift in how companies safeguard their top leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102199</guid>
      <pubDate>Wed, 01 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102199-the-rising-tide-of-executive-protection-corporations-ramp-up-security-in-an-era-of-heightened-threats</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Man-walking-with-briefcase-by-Marten-Bjork.webp?t=1774983008" type="image/png" length="369171"/>
    </item>
    <item>
      <title>Mexico Security Crisis: Never Waste a Crisis</title>
      <description>
        <![CDATA[<p>The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102185</guid>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102185-mexico-security-crisis-never-waste-a-crisis</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Four-people-in-suits-by-Vitaly-Gariev.webp?t=1773848065" type="image/png" length="428539"/>
    </item>
    <item>
      <title>Document Protection: Why Hybrid Storage Is the Future of Security </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Strategically choose which data lives on a server and which lives physically.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102177</guid>
      <pubDate>Tue, 17 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102177-document-protection-why-hybrid-storage-is-the-future-of-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Open-filing-cabinet-by-Maksym-Kaharlytskyi.webp?t=1773670622" type="image/png" length="473786"/>
    </item>
    <item>
      <title>Security Team Member Dies in Standoff with Dallas Police</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A member of Democratic U.S. Rep. Jasmine Crockett’s security team was killed in a standoff with the Dallas police.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102179</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102179-security-team-member-dies-in-standoff-with-dallas-police</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Police-lights-by-Max-Fleischmann.webp?t=1773757343" type="image/png" length="471259"/>
    </item>
    <item>
      <title>Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Explosives were thrown&nbsp;outside of the residence of New York City Mayor&nbsp;Zohran Mamdani.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102167</guid>
      <pubDate>Tue, 10 Mar 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102167-explosives-thrown-in-attempted-terrorist-attack-near-nyc-mayors-home</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/NYPD-car-by-Campbell-Jensen.webp?t=1773158172" type="image/png" length="535664"/>
    </item>
    <item>
      <title>Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The most advanced security technology in the world cannot recover an asset that was inadequately protected at the most critical moment.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102163</guid>
      <pubDate>Tue, 10 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102163-object-specific-protection-the-non-negotiable-foundation-of-art-and-asset-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Art-museum-by-Andrew-Faires.webp?t=1773063449" type="image/png" length="270613"/>
    </item>
    <item>
      <title>Airport Security Challenges in the Midst of the DHS Shutdown</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>TSA is facing challenges due to the DHS shutdown.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102164</guid>
      <pubDate>Mon, 09 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102164-airport-security-challenges-in-the-midst-of-the-dhs-shutdown</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Airport-baggage-check-by-Phil-Mosley.webp?t=1773066755" type="image/png" length="593724"/>
    </item>
    <item>
      <title>Can the Industry Do More for Women in Security?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While women in security have seen forward progress, the path hasn’t always been linear.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102162</guid>
      <pubDate>Fri, 06 Mar 2026 14:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102162-can-the-industry-do-more-for-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/06/Woman-in-suit-by-Vitaly-Gariev.webp?t=1773279401" type="image/png" length="292579"/>
    </item>
    <item>
      <title>World Cup Safety and Security Is About More than Just Crime</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The 2026 World Cup tests every framework of public safety.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102159</guid>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102159-world-cup-safety-and-security-is-about-more-than-just-crime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/05/World-Cup-trophy-beside-goal-by-My-Profit-Tutor.webp?t=1772727405" type="image/png" length="505749"/>
    </item>
    <item>
      <title>Enhancing Incident Response with Integrated Access Control and Video Verification</title>
      <description>
        <![CDATA[<p>Evolving threats have security teams on alert to integrate solutions that both mitigate and combat different scenarios.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102145</guid>
      <pubDate>Fri, 27 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102145-enhancing-incident-response-with-integrated-access-control-and-video-verification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F3-Feat-Slide1-1170x658.webp?t=1772642385" type="image/jpeg" length="161473"/>
    </item>
    <item>
      <title>From the Outside In: A Smarter Approach to Vendor Access</title>
      <description>
        <![CDATA[<p>Modern access control strategies are shifting focus to vendors, contractors, and the perimeter itself.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102141</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102141-from-the-outside-in-a-smarter-approach-to-vendor-access</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0226-F4-Feat-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="72673"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>DHS Shutdown to Begin Saturday, February 14</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102125</guid>
      <pubDate>Fri, 13 Feb 2026 13:00:34 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102125-dhs-shutdown-to-begin-saturday-february-14</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/luke-michael-Tdwu35bCUj0-unsplash.webp?t=1772041698" type="image/jpeg" length="118039"/>
    </item>
    <item>
      <title>55% Healthcare Workers Faced Increases in Violence — How Is Security Adapting to Protect Them?</title>
      <author></author>
      <description>
        <![CDATA[<p>How are organizations responding to rising threats against healthcare staff? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102119</guid>
      <pubDate>Wed, 11 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102119-55-healthcare-workers-faced-increases-in-violence-how-is-security-adapting-to-protect-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Healthcare-worker-by-Nappy.webp?t=1770858201" type="image/png" length="349288"/>
    </item>
    <item>
      <title>Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching</title>
      <description>
        <![CDATA[<p>The Super Bowl is not just a game, but a blueprint for how modern risk must be managed.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102114</guid>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102114-security-risks-around-super-bowl-lx-what-security-leaders-should-be-watching</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/NFL-footballs-by-Adrian-Curiel.webp?t=1770858201" type="image/png" length="480705"/>
    </item>
    <item>
      <title>How Banks Can Protect Their Most Valuable Asset: Customers</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts share how banks and financial institutions can defend their people, property and customers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102104</guid>
      <pubDate>Tue, 03 Feb 2026 00:08:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102104-how-banks-can-protect-their-most-valuable-asset-customers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F1-Feat-Slide1-1170x658.webp?t=1770858202" type="image/jpeg" length="76899"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>The Salary of a Chief Security Officer</title>
      <description>
        <![CDATA[<p>The 24th annual Security and Compliance Compensation report gives industry professionals insight into what their peers are earning.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102069</guid>
      <pubDate>Tue, 13 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102069-the-salary-of-a-chief-security-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F1-HERO-Slide-1440x750.webp?t=1768469520" type="image/jpeg" length="179508"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>CISA Releases Guide for Stadium and Arena Security</title>
      <author></author>
      <description>
        <![CDATA[<p>This published guide supports security leaders in protecting venues.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102061</guid>
      <pubDate>Wed, 24 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102061-cisa-releases-guide-for-stadium-and-arena-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/22/Confetti-falling-on-crowd-by-Elena-de-Soto.webp?t=1768469520" type="image/png" length="830345"/>
    </item>
    <item>
      <title>What Can Security Leaders Learn From Prevented University Attack?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Campus police were targeted in a planned university attack.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102055</guid>
      <pubDate>Fri, 19 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102055-what-can-security-leaders-learn-from-prevented-university-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/18/Smiling-officer-by-Arthur-Ogleznev.webp?t=1766527865" type="image/png" length="517084"/>
    </item>
    <item>
      <title>No More Failures of Imagination: Future Proofing Airport Employee Screening</title>
      <description>
        <![CDATA[<p>How to protect American flyers and airport employees from another tragic <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“failure of imagination.”</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102053</guid>
      <pubDate>Thu, 18 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102053-no-more-failures-of-imagination-future-proofing-airport-employee-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/17/Emply-airplane-seats-by-Parmanand-Jagnandan.webp?t=1766527864" type="image/png" length="431431"/>
    </item>
    <item>
      <title>Breaking Down the Security, Risk of Recent University Firing</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security expert discusses the recent firing of University of Michigan coach Sherrone Moore.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102052</guid>
      <pubDate>Tue, 16 Dec 2025 07:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102052-breaking-down-the-security-risk-of-recent-university-firing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/Football-on-field-by-Paolo-Aldrighetti.webp?t=1766527865" type="image/png" length="556616"/>
    </item>
    <item>
      <title>Cost Center to Value Driver: How Physical Security Is Transforming</title>
      <author></author>
      <description>
        <![CDATA[<p>Physical security’s contributions to organizational objectives have increased.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102043</guid>
      <pubDate>Fri, 12 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102043-cost-center-to-value-driver-how-physical-security-is-transforming</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/11/Security-guard-by-Job-Moses.webp?t=1766527866" type="image/png" length="279444"/>
    </item>
    <item>
      <title>The Evolving Role of VMS in Connected Cities</title>
      <description>
        <![CDATA[<p>By integrating data from connected systems, sensors and devices, ‘smart cities’ better understand how municipal resources are used and where problems arise.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102039</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102039-the-evolving-role-of-vms-in-connected-cities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/09/ben-o-bro-wpU4veNGnHg-unsplash.webp?t=1765309428" type="image/jpeg" length="177069"/>
    </item>
    <item>
      <title>US Survey Respondents Indicate Desire for Additional Gun Detection</title>
      <description>
        <![CDATA[<p>Americans share desire for additional gun detection.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102038</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102038-us-survey-respondents-indicate-desire-for-additional-gun-detection</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-News2-Feat-Slide1-1170x658.webp?t=1765296238" type="image/jpeg" length="129590"/>
    </item>
    <item>
      <title>The New Real-Time Crime Center in an Age of Agentic AI</title>
      <description>
        <![CDATA[<p>Real-time crime centers have become integral to many public safety efforts.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102035</guid>
      <pubDate>Tue, 09 Dec 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102035-the-new-real-time-crime-center-in-an-age-of-agentic-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/08/Monitors-with-symbols-by-Dan-LeFebvre.webp?t=1765215114" type="image/png" length="539487"/>
    </item>
  </channel>
</rss>
